CVE-2026-27785: Hardcoded Credentials in Milesight AIOT Camera
プラットフォーム
linux
コンポーネント
milesight-ms-cxx63-pd
CVE-2026-27785 identifies a critical security flaw within Milesight MS-Cxx63-PD AIOT Camera Firmware. This vulnerability stems from the presence of hardcoded credentials, granting attackers potentially unrestricted access to the camera and its associated data. The affected firmware versions include those from 0.0.0 through T63.8.0.4LPR-r3. A firmware update is necessary to resolve this issue.
影響と攻撃シナリオ翻訳中…
The presence of hardcoded credentials within the Milesight AIOT camera firmware presents a severe security risk. An attacker who discovers these credentials can gain complete control over the camera, including access to live video feeds, recorded footage, and configuration settings. This could lead to unauthorized surveillance, data theft, and potential manipulation of the camera's functionality. Furthermore, compromised cameras can be leveraged as entry points for lateral movement within a network, potentially impacting other connected devices and systems. The blast radius extends to any sensitive data or systems accessible through the camera.
悪用の状況翻訳中…
CVE-2026-27785 was published on 2026-04-27. The vulnerability's severity is rated HIGH (CVSS: 8.8). There is currently no indication of this vulnerability being actively exploited in the wild. Public proof-of-concept (POC) code is not yet available, but the nature of hardcoded credentials makes it likely that exploits will emerge. Monitor CISA and NVD advisories for updates.
脅威インテリジェンス
エクスプロイト状況
EPSS
0.02% (5% パーセンタイル)
CVSS ベクトル
これらのメトリクスの意味は?
- Attack Vector
- 隣接 — 同一LAN・Bluetooth・ローカル無線セグメントへの近接が必要。
- Attack Complexity
- 低 — 特別な条件不要。安定して悪用可能。
- Privileges Required
- なし — 認証不要。資格情報なしで悪用可能。
- User Interaction
- なし — 自動かつ無音の攻撃。被害者は何もしない。
- Scope
- 変化なし — 影響は脆弱なコンポーネントのみ。
- Confidentiality
- 高 — 機密性の完全喪失。全データが読み取り可能。
- Integrity
- 高 — 任意のデータの書き込み・変更・削除が可能。
- Availability
- 高 — 完全なクラッシュまたはリソース枯渇。完全なサービス拒否。
影響を受けるソフトウェア
弱点分類 (CWE)
タイムライン
- 公開日
- 更新日
- EPSS 更新日
緩和策と回避策翻訳中…
The primary mitigation for CVE-2026-27785 is to upgrade the Milesight MS-Cxx63-PD AIOT Camera Firmware to a version that addresses the hardcoded credentials issue. Unfortunately, a fixed version is not yet specified. Until a patch is available, consider isolating the camera from the network to prevent unauthorized access. Implement strict network segmentation to limit the potential impact of a compromise. Monitor network traffic for unusual activity originating from the camera's IP address. Review and strengthen password policies for all other network devices to prevent lateral movement. After upgrade, confirm by attempting to access the camera's configuration interface with known, strong credentials.
修正方法翻訳中…
Actualice el firmware de la cámara Milesight MS-Cxx63-PD a una versión corregida que no contenga las credenciales codificadas. Consulte la página de soporte de Milesight para obtener las últimas versiones de firmware y las instrucciones de actualización.
よくある質問翻訳中…
What is CVE-2026-27785 — Hardcoded Credentials in Milesight AIOT Camera?
CVE-2026-27785 is a HIGH severity vulnerability affecting Milesight MS-Cxx63-PD AIOT Camera Firmware versions 0.0.0–T63.8.0.4LPR-r3. It involves hardcoded credentials, allowing unauthorized access to the camera and its data.
Am I affected by CVE-2026-27785 in Milesight AIOT Camera?
If you are using Milesight MS-Cxx63-PD AIOT Camera Firmware versions between 0.0.0 and T63.8.0.4LPR-r3, you are potentially affected by this vulnerability. Check your firmware version immediately.
How do I fix CVE-2026-27785 in Milesight AIOT Camera?
The recommended fix is to upgrade to a patched firmware version. Unfortunately, a fixed version is not yet specified. Until a patch is available, isolate the camera from the network.
Is CVE-2026-27785 being actively exploited?
There is currently no indication that CVE-2026-27785 is being actively exploited in the wild, but the nature of hardcoded credentials makes exploitation likely.
Where can I find the official Milesight advisory for CVE-2026-27785?
Refer to the Milesight website and security advisories for updates and information regarding CVE-2026-27785. Monitor CISA and NVD for updates as well.
今すぐ試す — アカウント不要
Upload any manifest (composer.lock, package-lock.json, WordPress plugin list…) or paste your component list. You get a vulnerability report instantly. Uploading a file is just the start: with an account you get continuous monitoring, Slack/email alerts, multi-project and white-label reports.
依存関係ファイルをドラッグ&ドロップ
composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...